Changeset 92793 in vbox for trunk/src/VBox
- Timestamp:
- Dec 7, 2021 10:01:45 PM (3 years ago)
- svn:sync-xref-src-repo-rev:
- 148711
- Location:
- trunk/src/VBox/Main/UnattendedTemplates
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/Main/UnattendedTemplates/win_nt6_unattended.xml
r91542 r92793 130 130 <RunAsynchronousCommand> 131 131 <Order>1</Order> 132 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassCPUCheck /t REG_DWORD /d 1</Path>132 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassCPUCheck /t REG_DWORD /d 1</Path> 133 133 <Description>Windows 11 disable CPU check</Description> 134 134 </RunAsynchronousCommand> 135 135 <RunAsynchronousCommand> 136 136 <Order>2</Order> 137 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassRAMCheck /t REG_DWORD /d 1</Path>137 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassRAMCheck /t REG_DWORD /d 1</Path> 138 138 <Description>Windows 11 disable RAM check</Description> 139 139 </RunAsynchronousCommand> 140 140 <RunAsynchronousCommand> 141 141 <Order>3</Order> 142 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassSecureBootCheck /t REG_DWORD /d 1</Path>142 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassSecureBootCheck /t REG_DWORD /d 1</Path> 143 143 <Description>Windows 11 disable Secure Boot check</Description> 144 144 </RunAsynchronousCommand> 145 145 <RunAsynchronousCommand> 146 146 <Order>4</Order> 147 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassStorageCheck /t REG_DWORD /d 1</Path>147 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassStorageCheck /t REG_DWORD /d 1</Path> 148 148 <Description>Windows 11 disable Storage check</Description> 149 149 </RunAsynchronousCommand> 150 150 <RunAsynchronousCommand> 151 151 <Order>5</Order> 152 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassTPMCheck /t REG_DWORD /d 1</Path>152 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassTPMCheck /t REG_DWORD /d 1</Path> 153 153 <Description>Windows 11 disable TPM check</Description> 154 154 </RunAsynchronousCommand> … … 175 175 <RunAsynchronousCommand> 176 176 <Order>1</Order> 177 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassCPUCheck /t REG_DWORD /d 1</Path>177 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassCPUCheck /t REG_DWORD /d 1</Path> 178 178 <Description>Windows 11 disable CPU check</Description> 179 179 </RunAsynchronousCommand> 180 180 <RunAsynchronousCommand> 181 181 <Order>2</Order> 182 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassRAMCheck /t REG_DWORD /d 1</Path>182 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassRAMCheck /t REG_DWORD /d 1</Path> 183 183 <Description>Windows 11 disable RAM check</Description> 184 184 </RunAsynchronousCommand> 185 185 <RunAsynchronousCommand> 186 186 <Order>3</Order> 187 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassSecureBootCheck /t REG_DWORD /d 1</Path>187 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassSecureBootCheck /t REG_DWORD /d 1</Path> 188 188 <Description>Windows 11 disable Secure Boot check</Description> 189 189 </RunAsynchronousCommand> 190 190 <RunAsynchronousCommand> 191 191 <Order>4</Order> 192 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassStorageCheck /t REG_DWORD /d 1</Path>192 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassStorageCheck /t REG_DWORD /d 1</Path> 193 193 <Description>Windows 11 disable Storage check</Description> 194 194 </RunAsynchronousCommand> 195 195 <RunAsynchronousCommand> 196 196 <Order>5</Order> 197 <Path>reg.exe add HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig /v BypassTPMCheck /t REG_DWORD /d 1</Path>197 <Path>reg.exe ADD /f HKLM\SYSTEM\Setup\LabConfig /v BypassTPMCheck /t REG_DWORD /d 1</Path> 198 198 <Description>Windows 11 disable TPM check</Description> 199 199 </RunAsynchronousCommand> -
trunk/src/VBox/Main/UnattendedTemplates/win_postinstall.cmd
r92769 r92793 116 116 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE% 117 117 118 rem Update the registry to autorun the service and make sure we've got autologon.119 echo *** Running: reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NTConfiguration /d %SystemDrive%\Apps\vboxtxs.cmd >> %MY_LOG_FILE%120 reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NTConfiguration /d %SystemDrive%\Apps\vboxtxs.cmd >> %MY_LOG_FILE% 2>&1121 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE%122 123 echo *** Running: reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v PowerdownAfterShutdown /d 1 >> %MY_LOG_FILE%124 reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v PowerdownAfterShutdown /d 1 >> %MY_LOG_FILE% 2>&1125 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE%126 127 echo *** Running: reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v ForceAutoLogon /d 1 >> %MY_LOG_FILE%128 reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v ForceAutoLogon /d 1 >> %MY_LOG_FILE% 2>&1129 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE%130 rem AutoAdminLogon too if administrator?131 132 118 rem Configure the firewall to allow TXS to listen. 133 119 echo *** Running: netsh firewall add portopening TCP 5048 "TestExecService 5048" >> %MY_LOG_FILE% … … 138 124 netsh firewall add portopening TCP 5042 "TestExecService 5042" >> %MY_LOG_FILE% 2>&1 139 125 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE% 126 127 rem Update the registry to autorun the service and make sure we've got autologon. 128 echo *** Running: reg.exe ADD /f HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NTConfiguration /d %SystemDrive%\Apps\vboxtxs.cmd >> %MY_LOG_FILE% 129 reg.exe ADD /f HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NTConfiguration /d %SystemDrive%\Apps\vboxtxs.cmd >> %MY_LOG_FILE% 2>&1 130 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE% 131 132 echo *** Running: reg.exe ADD /f "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v PowerdownAfterShutdown /d 1 >> %MY_LOG_FILE% 133 reg.exe ADD /f "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v PowerdownAfterShutdown /d 1 >> %MY_LOG_FILE% 2>&1 134 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE% 135 136 echo *** Running: reg.exe ADD /f "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v ForceAutoLogon /d 1 >> %MY_LOG_FILE% 137 reg.exe ADD /f "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v ForceAutoLogon /d 1 >> %MY_LOG_FILE% 2>&1 138 echo *** ERRORLEVEL: %ERRORLEVEL% >> %MY_LOG_FILE% 139 rem AutoAdminLogon too if administrator? 140 140 141 141 @@VBOX_COND_END@@
Note:
See TracChangeset
for help on using the changeset viewer.